-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
****************************** ****************************** ********
Title: Microsoft Security Bulletin Minor Revisions
Issued: April 10, 2013
****************************** ****************************** ********
Summary
=======
The following bulletins have undergone minor revision increments.
Please see the bulletin for more details.
* MS13-029
* MS13-apr
Bulletin Information:
=====================
* MS13-029 - Critical
- http://technet.microsoft.com/ security/bulletin/ms13-029
- Reason for Revision: V1.1 (April 10, 2013): Corrected the
version number for Remote Desktop Connection Client on
Windows 7 Service Pack 1 and Windows Server 2008 R2 Service
Pack 1 from 7.0 to 7.1. This is an informational change only.
There were no changes to security update files.
- Originally posted: April 9, 2013
- Updated: April 10, 2013
- Bulletin Severity Rating: Critical
- Version: 1.1
* MS13-apr
- http://technet.microsoft.com/ security/bulletin/ms13-apr
- Reason for Revision: V1.1 (April 10, 2013): For MS13-029,
corrected the version number for Remote Desktop Connection
Client on Windows 7 Service Pack 1 and Windows Server 2008
R2 Service Pack 1 from 7.0 to 7.1. This is an informational
change only. There were no changes to security update files.
- Originally posted: April 9, 2013
- Updated: April 10, 2013
- Version: 1.1
Other Information
=================
Follow us on Twitter for the latest information and updates:
http://twitter.com/ msftsecresponse
Recognize and avoid fraudulent email to Microsoft customers:
============================== ============================== =
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.
The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://technet.microsoft.com/ security/bulletin/pgp.
To receive automatic notifications whenever Microsoft Security
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://technet.microsoft.com/ security/dd252948.
****************************** ****************************** ********
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
****************************** ****************************** ********
For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/ fwlink/?LinkId=92781>.
For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/ fwlink/?LinkId=81184>.
For legal Information, see:
<http://www.microsoft.com/ info/legalinfo/default.mspx>.
This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
wsFVAwUBUWYIghWqSyu+ jsPhAQihtRAAjvkJTbmb1tVnGYFf0g w7ReuGs148G9Fe
k+rf4K7F1/ lUrK5soecPNcgB9rpzdMAfvGi1ECs7 YuDSxSVe0b37VV4L6/T50j2U
Uy4QLCZOFDAnPRVX34HtTWUY4+ KHsYoX3+qRDsIx+brIb9cvm+ LLy5Ji0ssqXQI0
eYLikWVM8RGK6VDCn7R7EBAYYpTimb Q6V1bZc17pGdyCPkN22ju+ rwVojuq8yNl/
hR/DVn8Z0Ib8/ uwDGnc1LpWPj4sbu0W7bKY0FHUU4CA v5lN0KRwVhQTli8MZKx5f
7SG6GHenKru7DBUm5Chp2wrUgRgZ/ k4qNj82xBzx/ vJLm89DPFmBeHYZZYWr0g9V
Mk8zwrrhbExDxhB6XTLwrvPVSBK47e Uiu2QFmWalX6AUpA1GYgybp0OMPeas elHv
yoA7zJpfauYalumk2axmFfcjHrNShQ eFQHFunPXjndrfOxSDBSyDH9n80Rl3 Iyhr
uZ6B616CJ7iJeXzBaB5Dsr6Q8hLKvc dPSuPX26FSMTKMufBF+r7RD+ CVr3xnmc/x
IJhBTwhsJyEpzC81/ pqP45PwLaVCEsECk0Al0Oh5/ RjzaBhCWls2Rk/vHgusJ5sF
BgbM6t25tLhsi1p762nyfYZx2OCDN1 tCRFxQSdXPoto2JhkkbGoLMNTW9JvN nNUn
BwguAzL1Uco=
=vDVK
-----END PGP SIGNATURE-----
Hash: SHA256
******************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: April 10, 2013
******************************
Summary
=======
The following bulletins have undergone minor revision increments.
Please see the bulletin for more details.
* MS13-029
* MS13-apr
Bulletin Information:
=====================
* MS13-029 - Critical
- http://technet.microsoft.com/
- Reason for Revision: V1.1 (April 10, 2013): Corrected the
version number for Remote Desktop Connection Client on
Windows 7 Service Pack 1 and Windows Server 2008 R2 Service
Pack 1 from 7.0 to 7.1. This is an informational change only.
There were no changes to security update files.
- Originally posted: April 9, 2013
- Updated: April 10, 2013
- Bulletin Severity Rating: Critical
- Version: 1.1
* MS13-apr
- http://technet.microsoft.com/
- Reason for Revision: V1.1 (April 10, 2013): For MS13-029,
corrected the version number for Remote Desktop Connection
Client on Windows 7 Service Pack 1 and Windows Server 2008
R2 Service Pack 1 from 7.0 to 7.1. This is an informational
change only. There were no changes to security update files.
- Originally posted: April 9, 2013
- Updated: April 10, 2013
- Version: 1.1
Other Information
=================
Follow us on Twitter for the latest information and updates:
http://twitter.com/
Recognize and avoid fraudulent email to Microsoft customers:
==============================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.
The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://technet.microsoft.com/
To receive automatic notifications whenever Microsoft Security
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://technet.microsoft.com/
******************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
******************************
For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/
For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/
For legal Information, see:
<http://www.microsoft.com/
This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
wsFVAwUBUWYIghWqSyu+
k+rf4K7F1/
Uy4QLCZOFDAnPRVX34HtTWUY4+
eYLikWVM8RGK6VDCn7R7EBAYYpTimb
hR/DVn8Z0Ib8/
7SG6GHenKru7DBUm5Chp2wrUgRgZ/
Mk8zwrrhbExDxhB6XTLwrvPVSBK47e
yoA7zJpfauYalumk2axmFfcjHrNShQ
uZ6B616CJ7iJeXzBaB5Dsr6Q8hLKvc
IJhBTwhsJyEpzC81/
BgbM6t25tLhsi1p762nyfYZx2OCDN1
BwguAzL1Uco=
=vDVK
-----END PGP SIGNATURE-----